Security Information Management Reports

Basic SIEM Analytics Steps to Know
sponsored by LogRhythm, Inc.
EGUIDE: All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Learn three fundamental steps to take that will help you get the most out of your security information and event management tool.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

Former Healthcare CIO Talks Cybersecurity in Healthcare
sponsored by Optum
EGUIDE: Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Resource Center: Stop Threats and Prevent Data Loss
sponsored by McAfee, Inc.
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

McAfee, Inc.

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Enhance Your Endpoint Security Protection
sponsored by Trend Micro, Inc.
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

Trend Micro, Inc.

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by Cisco Umbrella
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco Umbrella

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.